hackerPHItrainingnetworkIPspywarephishingsmishingIPSvishingEDRriskassessmentincidentresponserootkitBECriskfirewallmalwareresilienceFTPbugcryptographycyberattackbotnetspoofingransomwareIoTVPNDefense-in-depthCyberDefenseworminsiderthreatantivirusdefenseevasionsecurityawarenesspentestIDSviruspassphrasezero-dayvulnerabilityDarkWebsecuritypolicyspambusinesscontinuityHIPAAOSavailabilityidentitytheftDDoSSecurityOperationsconfidentialityintegrityCIAtriadIOCpasswordsocialengineeringadminAPTCyberSecuritypacketincidentWISPProofpointencryptionSyssecAdminMFAPIIbreachcomplianceescalationexploithackerPHItrainingnetworkIPspywarephishingsmishingIPSvishingEDRriskassessmentincidentresponserootkitBECriskfirewallmalwareresilienceFTPbugcryptographycyberattackbotnetspoofingransomwareIoTVPNDefense-in-depthCyberDefenseworminsiderthreatantivirusdefenseevasionsecurityawarenesspentestIDSviruspassphrasezero-dayvulnerabilityDarkWebsecuritypolicyspambusinesscontinuityHIPAAOSavailabilityidentitytheftDDoSSecurityOperationsconfidentialityintegrityCIAtriadIOCpasswordsocialengineeringadminAPTCyberSecuritypacketincidentWISPProofpointencryptionSyssecAdminMFAPIIbreachcomplianceescalationexploit

Cyber Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
  1. hacker
  2. PHI
  3. training
  4. network
  5. IP
  6. spyware
  7. phishing
  8. smishing
  9. IPS
  10. vishing
  11. EDR
  12. risk assessment
  13. incident response
  14. rootkit
  15. BEC
  16. risk
  17. firewall
  18. malware
  19. resilience
  20. FTP
  21. bug
  22. cryptography
  23. cyber attack
  24. botnet
  25. spoofing
  26. ransomware
  27. IoT
  28. VPN
  29. Defense-in-depth
  30. Cyber Defense
  31. worm
  32. insider threat
  33. antivirus
  34. defense evasion
  35. security awareness
  36. pentest
  37. IDS
  38. virus
  39. passphrase
  40. zero-day
  41. vulnerability
  42. Dark Web
  43. security policy
  44. spam
  45. business continuity
  46. HIPAA
  47. OS
  48. availability
  49. identity theft
  50. DDoS
  51. Security Operations
  52. confidentiality
  53. integrity
  54. CIA triad
  55. IOC
  56. password
  57. social engineering
  58. admin
  59. APT
  60. Cyber Security
  61. packet
  62. incident
  63. WISP
  64. Proofpoint
  65. encryption
  66. SyssecAdmin
  67. MFA
  68. PII
  69. breach
  70. compliance
  71. escalation
  72. exploit